Someone Call Security — Early yesterday, we were contacted by two blog journalists who had just been offered internal business documents stolen from Twitter by a hacker. — First, it's important to note how these documents were stolen. In this case, a Twitter employee used the same non-unique password on multiple services.

Twitter Widens Blog War — Twitter seems only to have grown more furious at the tech blog that published its internal documents, accusing TechCrunch of lying and hinting at legal action. Bizarrely, TechCrunch is refusing to fight back. — TechCrunch this week published internal Twitter documents obtained by a computer hacker.

App stores are not the future, says Google — Apple customers may have downloaded 1.5bn applications from its AppStore in the past year for their iPhones and iPod touches, but the service does not represent the future for the mobile industry, according to Google.

Opera: Microsoft's ‘minor tweak’ of Windows 7 not enough — Microsoft may have felt forced to leave parts of IE within Windows, since some of the OS's functionality, particularly Windows Update, likely depends on those components. — A month ago, Microsoft acknowledged that its unilateral move might …

Opera slams Microsoft's Windows 7 E move - again — Hokey-cokey IE8 option not good for rivals — Understand how application security is evolving — Microsoft is continuing to insist it has gone to great lengths in recent months to appease European antitrust watchdogs by saying it will …

GOOGLE ANNOUNCES SECOND QUARTER 2009 RESULTS — Google Inc. (NASDAQ: GOOG) today announced financial results for the quarter ended June 30, 2009. — “Google had a very good quarter, especially given the continued macro-economic downturn. While most of the world's largest economies shrank …

Firefox 3.5.1 Patches a Critical Security Bug — The first update to 3.5 has launched ahead of schedule — A critical security vulnerability in the latest Firefox 3.5 was disclosed a few days ago affecting the Just-in-Time (JIT) JavaScript compiler. The bug could be used by an attacker …

The Great Google Doodle Triforce Conspiracy — In many well-known programs there are hidden features or messages called easter eggs, being put there by the developers for you to find. Like in some applications from Google: Docs (Cliply), Picasa (bears) and Reader (ninja and the end of internet).

Steal This Code — GOLDMAN SACHS'S announcement this week of record quarterly profits has thankfully overshadowed another news event there earlier this month. Sergey Aleynikov, a former programmer for Goldman, was arrested and accused of stealing computer programs that make rapid …

Music industry wants cut of Pirate Bay sale — The music industry will attempt to seize money paid to acquire the Pirate Bay, according to a high-level music industry source and a spokesman for the International Federation of the Phonographic Industry (IFPI), the trade group representing the music industry worldwide.

Games Industry Suffers From Recession, Finally — After a few months of lagging sales, market researcher NPD Group is finally saying the recession caught up with the video games industry. All it took was for gaming to suffer its biggest year-over-year sales drop in 9 years.

The Big, Awkward Problem of YouTube Fees — YouTube has become our national trove of free video, a place where a company can find a free platform for video marketing junk and individuals can watch dogs sleepwalk. But as we've discussed before, the Web's video giant costs Google …